Skip to content

Commit 7776eda

Browse files
authored
Merge pull request #293267 from MicrosoftDocs/main
1/20/2025 AM Publish
2 parents e4d7fcc + ba34375 commit 7776eda

File tree

72 files changed

+5157
-7123
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

72 files changed

+5157
-7123
lines changed

.openpublishing.redirection.json

Lines changed: 5089 additions & 5004 deletions
Large diffs are not rendered by default.

articles/automation/enable-managed-identity-for-automation.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Using a system-assigned managed identity for an Azure Automation account
33
description: This article describes how to set up managed identity for Azure Automation accounts.
44
services: automation
55
ms.subservice: process-automation
6-
ms.date: 09/09/2024
6+
ms.date: 01/20/2025
77
ms.topic: how-to
88
ms.custom: devx-track-azurepowershell
99
ms.service: azure-automation
@@ -23,7 +23,7 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
2323

2424
- An Azure resource that you want to access from your Automation runbook. This resource needs to have a role defined for the managed identity, which helps the Automation runbook authenticate access to the resource. To add roles, you need to be an owner for the resource in the corresponding Microsoft Entra tenant.
2525

26-
- If you want to execute hybrid jobs using a managed identity, update the agent-based Hybrid Runbook Worker to the latest version. There is no minimum version requirement for extension-based Hybrid Runbook Worker, and all the versions would work. The minimum required versions for the agent-based Hybrid Worker are:
26+
- There is no minimum version requirement for extension-based Hybrid Runbook Worker, and all the versions would work. The minimum required versions for the agent-based Hybrid Worker are:
2727

2828
- Windows Hybrid Runbook Worker: version 7.3.1125.0
2929
- Linux Hybrid Runbook Worker: version 1.7.4.0
@@ -67,7 +67,7 @@ $automationAccount = "automationAccountName"
6767
```
6868

6969
> [!IMPORTANT]
70-
> The new Automation account-level identity overrides any previous VM-level system-assigned identities which are described in [Use runbook authentication with managed identities](./automation-hrw-run-runbooks.md#runbook-auth-managed-identities). If you're running hybrid jobs on Azure VMs that use a VM's system-assigned identity to access runbook resources, then the Automation account identity will be used for the hybrid jobs. This means your existing job execution may be affected if you've been using the Customer Managed Keys (CMK) feature of your Automation account.<br/><br/>If you wish to continue using the VM's managed identity, you shouldn't enable the Automation account-level identity. If you've already enabled it, you can disable the Automation account system-assigned managed identity. See [Disable your Azure Automation account managed identity](./disable-managed-identity-for-automation.md).
70+
> The new Automation account-level identity overrides any previous VM-level system-assigned identities which are described in [Use runbook authentication with managed identities](./automation-hrw-run-runbooks.md#runbook-auth-managed-identities). If you're running hybrid jobs on Azure VMs that use a VM's system-assigned identity to access runbook resources, then the Automation account identity will be used for the hybrid jobs. <br/><br/>If you wish to continue using the VM's managed identity, you shouldn't enable the Automation account-level identity. If you've already enabled it, you can disable the Automation account system-assigned managed identity. See [Disable your Azure Automation account managed identity](./disable-managed-identity-for-automation.md).
7171
7272
### Enable using the Azure portal
7373

@@ -258,7 +258,7 @@ Perform the following steps.
258258
259259
An Automation account can use its system-assigned managed identity to get tokens to access other resources protected by Microsoft Entra ID, such as Azure Key Vault. These tokens don't represent any specific user of the application. Instead, they represent the application that's accessing the resource. In this case, for example, the token represents an Automation account.
260260
261-
Before you can use your system-assigned managed identity for authentication, set up access for that identity on the Azure resource where you plan to use the identity. To complete this task, assign the appropriate role to that identity on the target Azure resource.
261+
Before you can use your system-assigned managed identity to perform any actions within Azure, set up access for that identity on the Azure resource where you plan to use the identity. To complete this task, assign the appropriate role to that identity on the target Azure resource.
262262
263263
Follow the principal of least privilege and carefully assign permissions only required to execute your runbook. For example, if the Automation account is only required to start or stop an Azure VM, then the permissions assigned to the Run As account or managed identity needs to be only for starting or stopping the VM. Similarly, if a runbook is reading from blob storage, then assign read-only permissions.
264264

articles/azure-netapp-files/configure-customer-managed-keys.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,7 @@ The following diagram demonstrates how customer-managed keys work with Azure Net
3434
* Applying Azure network security groups on the private link subnet to Azure Key Vault isn't supported for Azure NetApp Files customer-managed keys. Network security groups don't affect connectivity to Private Link unless `Private endpoint network policy` is enabled on the subnet. It's _required_ to keep this option disabled.
3535
* If Azure NetApp Files fails to create a customer-managed key volume, error messages are displayed. Refer to the [Error messages and troubleshooting](#error-messages-and-troubleshooting) section for more information.
3636
* Do not make any changes to the underlying Azure Key Vault or Azure Private Endpoint after creating a customer-managed keys volume. Making changes can make the volumes inaccessible.
37+
* Azure NetApp Files supports the ability to [seamlessly transition existing volumes from platform-managed keys to customer-managed-keys](#transition-volumes).
3738
* If Azure Key Vault becomes inaccessible, Azure NetApp Files loses its access to the encryption keys and the ability to read or write data to volumes enabled with customer-managed keys. In this situation, create a support ticket to have access manually restored for the affected volumes.
3839
* Azure NetApp Files supports customer-managed keys on source and data replication volumes with cross-region replication or cross-zone replication relationships.
3940

articles/backup/azure-file-share-support-matrix.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Support Matrix for Azure file share backup by using Azure Backup
33
description: Provides a summary of support settings and limitations when backing up Azure file shares.
44
ms.topic: reference
5-
ms.date: 01/06/2025
5+
ms.date: 01/20/2025
66
ms.custom: references_regions, engagement-fy24
77
ms.service: azure-backup
88
author: AbhishekMallick-MS
@@ -55,7 +55,7 @@ Cross Subscription Backup (CSB) for Azure File share (preview) is currently avai
5555

5656
| Storage account details | Support |
5757
| --- | --- |
58-
| Account Kind | Azure Backup supports Azure file shares present in general-purpose v2, and file storage type storage accounts. |
58+
| Account Kind | Azure Backup supports Azure file shares present in general-purpose v2, and file storage type storage accounts. <br><br> Storage accounts configured with private endpoints are supported. However, a private endpoint on the vault doesn't apply to Azure Files backup scenarios. |
5959

6060
>[!Important]
6161
>The source Storage Account must have the **Allow storage account key access** setting enabled for successful Azure Files backup and restore.

articles/virtual-desktop/TOC.yml

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -596,33 +596,33 @@
596596
- name: Troubleshoot
597597
items:
598598
- name: Troubleshooting overview, feedback, and support
599-
href: troubleshoot-set-up-overview.md
599+
href: /troubleshoot/azure/virtual-desktop/troubleshoot-set-up-overview?context=/azure/virtual-desktop/context/context
600600
- name: Host pools and session hosts
601601
items:
602602
- name: Host pool creation
603603
displayName: troubleshooting
604-
href: troubleshoot-set-up-issues.md
604+
href: /troubleshoot/azure/virtual-desktop/troubleshoot-set-up-issues?context=/azure/virtual-desktop/context/context
605605
- name: Session host update
606606
displayName: troubleshooting, vms
607-
href: troubleshoot-session-host-update.md
607+
href: /troubleshoot/azure/virtual-desktop/troubleshoot-session-host-configuration-update?context=/azure/virtual-desktop/context/context
608608
- name: Session host virtual machine configuration
609609
displayName: troubleshooting, vms
610-
href: troubleshoot-vm-configuration.md
610+
href: /troubleshoot/azure/virtual-desktop/troubleshoot-vm-configuration?context=/azure/virtual-desktop/context/context
611611
- name: Session host statuses and health checks
612612
displayName: troubleshooting
613613
href: troubleshoot-statuses-checks.md
614614
- name: Management issues
615615
displayName: troubleshooting
616-
href: troubleshoot-management-issues.md
616+
href: /troubleshoot/azure/virtual-desktop/troubleshoot-management-issues?context=/azure/virtual-desktop/context/context
617617
- name: Azure Virtual Desktop PowerShell
618618
displayName: troubleshooting, command line
619-
href: troubleshoot-powershell.md
619+
href: /troubleshoot/azure/virtual-desktop/troubleshoot-powershell?context=/azure/virtual-desktop/context/context
620620
- name: Azure Virtual Desktop Agent
621621
displayName: troubleshooting
622-
href: troubleshoot-agent.md
622+
href: /troubleshoot/azure/virtual-desktop/troubleshoot-agent?context=/azure/virtual-desktop/context/context
623623
- name: Service connections
624624
displayName: troubleshooting, rdp
625-
href: troubleshoot-service-connection.md
625+
href: /troubleshoot/azure/virtual-desktop/troubleshoot-service-connection?context=/azure/virtual-desktop/context/context
626626
- name: Remote Desktop app
627627
items:
628628
- name: Windows Desktop client basic troubleshooting
@@ -654,34 +654,34 @@
654654
href: remotefx-graphics-performance-counters.md
655655
- name: Connections to Microsoft Entra joined VMs
656656
displayName: troubleshooting, identity
657-
href: troubleshoot-azure-ad-connections.md
657+
href: /troubleshoot/azure/virtual-desktop/troubleshoot-azure-ad-connections?context=/azure/virtual-desktop/context/context
658658
- name: Device redirections
659659
displayName: troubleshooting, rdp apps, clients
660-
href: troubleshoot-device-redirections.md
660+
href: /troubleshoot/azure/virtual-desktop/troubleshoot-device-redirections?context=/azure/virtual-desktop/context/context
661661
- name: Azure Virtual Desktop Insights
662662
displayName: troubleshooting, avd insights, avdi
663-
href: troubleshoot-insights.md
663+
href: /troubleshoot/azure/virtual-desktop/troubleshoot-insights?context=/azure/virtual-desktop/context/context
664664
- name: Azure Files authorization
665665
displayName: troubleshooting
666-
href: troubleshoot-authorization.md
666+
href: /troubleshoot/azure/virtual-desktop/troubleshoot-authorization?context=/azure/virtual-desktop/context/context
667667
- name: Connection quality issues
668668
displayName: troubleshooting, network, monitoring
669-
href: troubleshoot-connection-quality.md
669+
href: /troubleshoot/azure/virtual-desktop/troubleshoot-connection-quality?context=/azure/virtual-desktop/context/context
670670
- name: RDP Shortpath
671671
displayName: troubleshooting, network, udp
672-
href: troubleshoot-rdp-shortpath.md
672+
href: /troubleshoot/azure/virtual-desktop/troubleshoot-rdp-shortpath?context=/azure/virtual-desktop/context/context
673673
- name: Multimedia redirection
674674
displayName: troubleshooting, mmr
675-
href: troubleshoot-multimedia-redirection.md
675+
href: /troubleshoot/azure/virtual-desktop/troubleshoot-multimedia-redirection?context=/azure/virtual-desktop/context/context
676676
- name: Microsoft Teams
677677
displayName: troubleshooting
678678
href: troubleshoot-teams.md
679679
- name: Custom image templates
680680
displayName: troubleshooting, virtual machines, vms, images, vhd, vhdx
681-
href: troubleshoot-custom-image-templates.md
681+
href: /troubleshoot/azure/virtual-desktop/troubleshoot-custom-image-templates?context=/azure/virtual-desktop/context/context
682682
- name: App attach
683683
displayName: troubleshooting, apps, remoteapp
684-
href: troubleshoot-app-attach.md
684+
href: /troubleshoot/azure/virtual-desktop/troubleshoot-app-attach?context=/azure/virtual-desktop/context/context
685685
- name: Reference
686686
items:
687687
- name: Azure CLI

articles/virtual-desktop/agent-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ The agent update normally lasts 2-3 minutes on a new VM and shouldn't cause your
4343

4444
Now that you have a better understanding of the Azure Virtual Desktop agent, here are some resources that might help you:
4545

46-
- If you're experiencing agent or connectivity-related issues, check out the [Azure Virtual Desktop Agent issues troubleshooting guide](troubleshoot-agent.md).
46+
- If you're experiencing agent or connectivity-related issues, check out the [Azure Virtual Desktop Agent issues troubleshooting guide](/troubleshoot/azure/virtual-desktop/troubleshoot-agent).
4747
- To schedule agent updates, see the [Scheduled Agent Updates document](scheduled-agent-updates.md).
4848
- To set up diagnostics for this feature, see the [Scheduled Agent Updates Diagnostics guide](agent-updates-diagnostics.md).
4949
- To find information about the latest and previous agent versions, see the [Agent Updates version notes](whats-new-agent.md).

articles/virtual-desktop/agent-updates-diagnostics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,4 +75,4 @@ For more information about Scheduled Agent Updates and the agent components, che
7575
- To learn how to schedule agent updates, see [Scheduled Agent Updates](scheduled-agent-updates.md).
7676
- For more information about the Azure Virtual Desktop agent, side-by-side stack, and Geneva Monitoring agent, see [Getting Started with the Azure Virtual Desktop Agent](agent-overview.md).
7777
- Learn more about the latest and previous agent versions at [What's new in the Azure Virtual Desktop agent](whats-new-agent.md).
78-
- If you're experiencing agent or connectivity-related issues, see the [Azure Virtual Desktop Agent issues troubleshooting guide](troubleshoot-agent.md).
78+
- If you're experiencing agent or connectivity-related issues, see the [Azure Virtual Desktop Agent issues troubleshooting guide](/troubleshoot/azure/virtual-desktop/troubleshoot-agent).

articles/virtual-desktop/app-attach-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -224,7 +224,7 @@ Each session host mounts application images from the file share. You need to con
224224

225225
- For Azure NetApp Files, you can [create an SMB volume](../azure-netapp-files/azure-netapp-files-create-volumes-smb.md) and configure NTFS permissions to give read access to each session host's computer object. Your session hosts need to be joined to Active Directory Domain Services or Microsoft Entra Domain Services.
226226

227-
You can verify the permissions are correct by using [PsExec](/sysinternals/downloads/psexec). For more information, see [Check file share access](troubleshoot-app-attach.md#check-file-share-access).
227+
You can verify the permissions are correct by using [PsExec](/sysinternals/downloads/psexec). For more information, see [Check file share access](/troubleshoot/azure/virtual-desktop/troubleshoot-app-attach#check-file-share-access).
228228

229229
### Performance
230230

articles/virtual-desktop/authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -125,6 +125,6 @@ To use a smart card in your session, make sure you've installed the smart card d
125125
## Next steps
126126

127127
- Curious about other ways to keep your deployment secure? Check out [Security best practices](security-guide.md).
128-
- Having issues connecting to Microsoft Entra joined VMs? Look at [Troubleshoot connections to Microsoft Entra joined VMs](troubleshoot-azure-ad-connections.md).
129-
- Having issues with in-session passwordless authentication? See [Troubleshoot WebAuthn redirection](troubleshoot-device-redirections.md#webauthn-redirection).
128+
- Having issues connecting to Microsoft Entra joined VMs? Look at [Troubleshoot connections to Microsoft Entra joined VMs](/troubleshoot/azure/virtual-desktop/troubleshoot-azure-ad-connections).
129+
- Having issues with in-session passwordless authentication? See [Troubleshoot WebAuthn redirection](/troubleshoot/azure/virtual-desktop/troubleshoot-device-redirections#webauthn-redirection).
130130
- Want to use smart cards from outside your corporate network? Review how to set up a [KDC Proxy server](key-distribution-center-proxy.md).

articles/virtual-desktop/azure-ad-joined-session-hosts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,4 +93,4 @@ Now that you've deployed some Microsoft Entra joined VMs, we recommend enabling
9393
- [Create a profile container with Azure Files and Microsoft Entra ID](create-profile-container-azure-ad.yml)
9494
- [Connect with the Windows Desktop client](users/connect-windows.md)
9595
- [Connect with the web client](users/connect-web.md)
96-
- [Troubleshoot connections to Microsoft Entra joined VMs](troubleshoot-azure-ad-connections.md)
96+
- [Troubleshoot connections to Microsoft Entra joined VMs](/troubleshoot/azure/virtual-desktop/troubleshoot-azure-ad-connections)

0 commit comments

Comments
 (0)